IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: "too many auth failures"?
What if there is limit on number of simultaneous ssh sessions? Let's say system can only reasonably support a single ssh session. Shouldn't there be a limit to prevent dos attack.
Also, public key authentication is not free from a cpu utlization perspective. On a 40MHz 68K processor, the signature can take well over second to verify.
----- Original Message -----
From: ietf-ssh-owner%NetBSD.org@localhost <ietf-ssh-owner%NetBSD.org@localhost>
To: ietf-ssh%netbsd.org@localhost <ietf-ssh%netbsd.org@localhost>
Sent: Wed Oct 27 07:15:12 2010
Subject: Re: "too many auth failures"?
>> My view is that servers should have two failure counters: one for
>> password and keyboard-interactive, another one for all others.
> Yeah, I'd thought about that too, but where do you stop? Which
> counter type would a ZKP use? Or EKE? Or IBE?
The "all others".
Think about the point of those failure counters: they're designed to
slow down password-guessing attacks. publickey, ZKP, etc, don't have
anything like password-guessing risks, so it's arguably inappropriate
to do failure counters for them.
/~\ The ASCII Mouse
\ / Ribbon Campaign
X Against HTML mouse%rodents-montreal.org@localhost
/ \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B
Home |
Main Index |
Thread Index |
Old Index